mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-14 05:45:59 +03:00
Fix matching condition and adjust test case
This commit is contained in:
parent
379f370095
commit
a719871458
2
CHANGES
2
CHANGES
@ -1,6 +1,8 @@
|
|||||||
v3.0.3 - YYYY-MMM-DD (to be released)
|
v3.0.3 - YYYY-MMM-DD (to be released)
|
||||||
-------------------------------------
|
-------------------------------------
|
||||||
|
|
||||||
|
- Fix SecResponseBodyAccess and ctl:requestBodyAccess directives
|
||||||
|
[Issue #1531 - @victorhora, @defanator]
|
||||||
- Fix OpenBSD build
|
- Fix OpenBSD build
|
||||||
[Issue #1841 - @victorhora, @zimmerle, @juanfra684]
|
[Issue #1841 - @victorhora, @zimmerle, @juanfra684]
|
||||||
- Fix parser to support GeoLookup with MaxMind
|
- Fix parser to support GeoLookup with MaxMind
|
||||||
|
@ -766,7 +766,7 @@ int Transaction::processRequestBody() {
|
|||||||
m_variableReqbodyProcessorError.set("0", m_variableOffset);
|
m_variableReqbodyProcessorError.set("0", m_variableOffset);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (m_rules->m_secRequestBodyAccess != RulesProperties::TrueConfigBoolean) {
|
if (m_rules->m_secRequestBodyAccess == RulesProperties::FalseConfigBoolean) {
|
||||||
if (m_requestBodyAccess != RulesProperties::TrueConfigBoolean) {
|
if (m_requestBodyAccess != RulesProperties::TrueConfigBoolean) {
|
||||||
#ifndef NO_LOGS
|
#ifndef NO_LOGS
|
||||||
debug(4, "Request body processing is disabled");
|
debug(4, "Request body processing is disabled");
|
||||||
|
@ -51,7 +51,7 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"expected":{
|
"expected":{
|
||||||
"debug_log":"Request body processing is enabled, but disable to this transaction due to ctl:requestBodyAccess action"
|
"debug_log":"Request body processing is enabled, but disabled to this transaction due to ctl:requestBodyAccess action"
|
||||||
},
|
},
|
||||||
"rules":[
|
"rules":[
|
||||||
"SecRuleEngine On",
|
"SecRuleEngine On",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user